DOI QR코드

DOI QR Code

Hyperledger Blockchain Design for Sharing, Spreading, and Protecting National Cybersecurity Information

  • Park, Dea-woo (Department of Convergence Engineering, Hoseo Graduate School of Venture) ;
  • Lee, Sang-hyeon (Department of Convergence Engineering, Hoseo Graduate School of Venture)
  • Received : 2020.03.13
  • Accepted : 2020.06.25
  • Published : 2020.06.30

Abstract

Real cyberterrors are invisible and difficult to identify. Even after a cyberattack, its origin and cause are difficult to determine. Cyberterrorism results in invisible cyberwars, and it is believed that World War IV will begin with a cyberwarfare. For national cybersecurity, information on cybersecurity must be collected, shared, and disseminated. In this study, we investigate a blockchain system designed based on the World Cybersecurity Agreement. National cybersecurity information is linked to the hyperledger blockchain system network through the National Cybersecurity Center. National cybersecurity information designs and uses a secure protocol for protection; further, it is collected, shared, and disseminated to treaty countries. National cybersecurity information is shared and spread by the hyperledger blockchain system, and it uses a cyberdefense system that responds to the cyberattacks and their origin. This paper serves as a policy and legislation guideline for forming a World Cybersecurity Agreement between countries.

Keywords

References

  1. OWASP Top Ten, Top 10 Web Application Security Risks [Internet], Available: https://owasp.org/www-project-top-ten/, 2020.
  2. W. Phillip and C. D. Brunst, "Terrorism and the Internet: new threats posed by cyberterrorism and terrorist use of the Internet, in Marianne Wade and Almir Maljevic' (eds.), a war on terror?: the European stance on a new threat," in Changing Laws and Human Rights Implications, New York, NY: Springer, 2010.
  3. T. Anna-Maria, "Cyberterrorism: in theory or in practice?," Defense Against Terrorism Review, vol. 3, no. 2, pp. 63-64, 2010.
  4. D. W. Park, "Draft of national cybersecurity act," International Journal of Security and Its Applications, vol. 9, no. 11, pp 105-112, 2015. https://doi.org/10.14257/ijsia.2015.9.11.11
  5. D. W. Park, "National cyber security organization system," in The National Cybersecurity Forum, National Cyber Safety Federation, National Assembly of the Republic of Korea, 2017.
  6. C. D. Cho and D. W. Park, "Building an overseas infrastructure offices of the information security industry," Journal of the Korea Institute of Information and Communication Engineering, vol. 20, no. 1, pp. 102-109, 2016.
  7. L. W. Santoso, R. Lim, and K. Trisnajaya, "Smart home system using Internet of things," Journal of Information and Communication Convergence Engineering, vol. 16, no. 1, pp. 60-65, 2018. https://doi.org/10.6109/jicce.2018.16.1.60
  8. K. Rim and D. Lim, "DoS attack control design of IoT system for 5G Era," Journal of Information and Communication Convergence Engineering, vol. 16, no. 2, pp. 93-98, 2018. https://doi.org/10.6109/JICCE.2018.16.2.93
  9. BLEEPINGCOMPUTER New LockerGoga Ransomware Allegedly Used in Altran Attack. [Internet], Available: https://www.bleepingcomputer.com/news/security/new-lockergoga-ransomware-allegedly-usedin-altran-attack/, 2020.
  10. Minister of Science and ICT Organization, [Internet], Available: https://www.msit.go.kr/english/msipContents/contents.do?mId=Mjg1. 2020.
  11. KISA Organization. [Internet], Available: https://www.kisa.or.kr/eng/aboutkisa/organization.jsp. 2020.
  12. S. H. Bae and D. W. Park, "Cyber weapon model for the national cybersecurity," Journal of the Korea Institute of Information and Communication Engineering, vol. 23, no. 2, pp. 221-228, 2019.